Vertical Industries  >   Leisure Industry  >  

Resorts

RSS Feed    Add to Google    Add to My Yahoo!
Resorts White Papers (View All Report Types)
 
Infrastructure Management Is Not Enough: The New IT Operations Imperative
sponsored by Mercury
WHITE PAPER: Infrastructure management is not enough to ensure enterprise applications are meeting business goals because users experience applications, NOT infrastructure.
Posted: 20 Dec 2005 | Published: 01 Dec 2005

Mercury

Case Study: Travel Agency Builds Business and Cuts Costs with the Right VDI
sponsored by VMware
WHITE PAPER: In this white paper, discover how a travel agency found an easily-deployable VDI solution that enabled them simplify IT management while streamlining business.
Posted: 27 May 2015 | Published: 31 Dec 2010

VMware

Rising Above the Competition as a Cloud Services Provider: Five Effective Steps for Claiming Your Share of the Pie
sponsored by CA Technologies.
WHITE PAPER: Learn how you can rise above the competition as a cloud provider, especially by using the five key steps outlined in this resource.
Posted: 06 Apr 2012 | Published: 06 Apr 2012

CA Technologies.

Managing and Securing Mobile Healthcare Data and Devices
sponsored by Fiberlink Communications
WHITE PAPER: Regulatory compliance tops the list of concerns among healthcare and life sciences IT professionals with 86% of healthcare IT decision-makers rating it as a high or critical priority over the course of the coming year. Check out this paper to find out more!
Posted: 17 Mar 2010 | Published: 17 Mar 2010

Fiberlink Communications

Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

Red Hat Integrates Enterprise Systems for a Holistic View of Customers
sponsored by Red Hat
WHITE PAPER: This case study shows how Red Hat was able to automatically update customer data across systems without resorting to manual intervention. Learn how this was possible through a data integration platform using open source, cloud-enabled technologies.
Posted: 04 Apr 2016 | Published: 04 Apr 2016

Red Hat

Hospitality and Cybercrime: How to Safeguard Sensitive Information
sponsored by SurfWatch Labs
WHITE PAPER: This white paper explores the many cyber-risks faced by the hospitality sector. Access it and discover just how much your business is at risk – and what you can do about it.
Posted: 06 Jan 2016 | Published: 06 Jan 2016

SurfWatch Labs

Credit Union Thwarts Cryptolocker Attack With Smart Backup Policy
sponsored by SimpliVity
RESOURCE CENTER: One credit union found their banking applications stopped working due to the cryptolocker ransomware. This custom article takes a look at how their hyper-converged infrastructure contained a backup policy that enabled them to restore their virtual machines – without impacting performance or availability.
Posted: 22 Apr 2016 | Published: 22 Apr 2016

SimpliVity

Three simple steps to building a digital framework
sponsored by ComputerWeekly.com
PRESENTATION: Mark Thompson, Digital and IT Director for TUI Travel Specialist & Activity, discusses IT transformation in this PowerPoint presentation.
Posted: 10 Dec 2013 | Published: 10 Dec 2013

ComputerWeekly.com

Mitel Customer Snapshot: Wauconda Community Unit School District
sponsored by Mitel Networks Limited
CASE STUDY: This short case study shows how one Illinois K-12 school district implemented a centralized and scalable collaboration platform that made the most out of limited IT resources.
Posted: 11 Apr 2016 | Published: 11 Apr 2016

Mitel Networks Limited

How Can You Ensure Stability and Reliability?
sponsored by Red Hat
WHITE PAPER: This whitepaper explains how Red Hat Enterprise Linux can provide the stable and proven enterprise platform you need to bring new levels of simplicity to your IT operations while ensuring your underlying infrastructure is completely secure.
Posted: 08 Oct 2014 | Published: 08 Oct 2014

Red Hat

Powering the Real-Time Enterprise
sponsored by Oracle Corporation
RESOURCE: In this infographic, learn how an in-memory database can speed time to insights by providing real-time analytics, relevant data at the speed of thought, customer-centric services, and more. Additionally, explore the technology behind this in-memory database offering, and what customers are saying about it.
Posted: 24 Mar 2016 | Published: 31 Dec 2014

Oracle Corporation

How Island Group Reduces Admin and Bandwidth Requirements using ApplicationServer XG
sponsored by Parallels, Inc.
CASE STUDY: The following case study reveals how by deploying ApplicationServer XG, Islands Hotels Group was able to reduce administration and bandwidth requirements.
Posted: 15 Mar 2016 | Published: 15 Mar 2016

Parallels, Inc.

Further IT Spending Cuts Likely in Europe's Public Sector
sponsored by ComputerWeekly.com
WHITE PAPER: The UK's June Budget provides a mandate for all government departments to submit their spending review plans before the summer break and reports that it has scheduled the government spending review for October.
Posted: 24 Oct 2011 | Published: 05 Jul 2010

ComputerWeekly.com

5 DBA Mistakes That Can Cost You Your Job
sponsored by Idera
WHITE PAPER: This white paper reveals the 5 unforgivable mistakes that could endanger the integrity, recoverability and security of the databases, including SQL Server, DBAs are supposed to protect.
Posted: 21 Jul 2014 | Published: 21 Jul 2014

Idera

Five Steps for Delivering Self-Service Business Intelligence to Everyone
sponsored by Information Builders
WHITE PAPER: Most organizations underestimate the complexity of self-service BI projects, failing to map out the different kinds of business users and their information requirements. This expert white paper explores Wayne Eckerson's 5 steps for delivering self-service BI to everyone in your business.
Posted: 11 Jun 2014 | Published: 11 Jun 2014

Information Builders

LTO-7 Tape Drives: Testing Capacity, Speed, LTFS Capabilities, and More
sponsored by LTO
WHITE PAPER: In this brief report, experts tested LTO tape drives from HPE, IBM, and Quantum, highlighting the similarities and differences regarding capacity, speed, LTFS functionality, transfer rate interchangeability, and backwards compatibility. Read on to discover which solution is right for your enterprise.
Posted: 19 Feb 2016 | Published: 19 Feb 2016

LTO

E-Guide: Configure Outbound Firewall Rules for Data Protection
sponsored by SearchSecurity.com
EGUIDE: A new form of firewall was recently developed in order to withstand more sophisticated threats. Consult this expert E-guide to learn more about the value of application firewalls and how they can benefit the security of your business.
Posted: 24 Aug 2012 | Published: 24 Aug 2012

SearchSecurity.com

Mitigating the Top 3 Office 365 Security Risks
sponsored by Mimecast
WHITE PAPER: This white paper examines how to mitigate the 3 key high risk areas of Office 365 email security.
Posted: 14 Sep 2015 | Published: 02 Sep 2015

Mimecast

How to Thwart Privilege Creep with Access Reviews
sponsored by SearchSecurity.com
EGUIDE: In this E-Guide from SearchSecurity.com, industry expert Peter H. Gregory delves deep into the topic of privilege creep: the risks, the remedies, and key tips for access review and automation success.
Posted: 10 Apr 2013 | Published: 10 Apr 2013

SearchSecurity.com

Building a Business Case for Cyber Threat Intelligence
sponsored by SurfWatch Labs
WHITE PAPER: This white paper gives you 5 main reasons for a risk-based approach to cybersecurity. Access now to learn how you can know the specific cyber threats targeting your business redirect your cyber tactics for the most effective defense and bring cybersecurity into the broader risk discussion.
Posted: 25 Mar 2016 | Published: 01 Feb 2016

SurfWatch Labs

Cyber Risk Report - Year in Review
sponsored by SurfWatch Labs
WHITE PAPER: This white paper provides high-level insight on both what cybercriminals are targeting and how they operated over the course of 2015. Learn about the evolving tactics used and how they are impacting business.
Posted: 29 Mar 2016 | Published: 01 Feb 2016

SurfWatch Labs

Case Study: How CHWC Improves HCAHPS Scores and Patient Care
sponsored by Imprivata
CASE STUDY: Healthcare organizations are at risk of HIPAA breaches as employees use legacy pagers and personal devices to communicate. This case study examines how one health system replaced their outdated pager system and leveraged BYOD tech to improve patient care and mitigate device risks.
Posted: 22 Mar 2016 | Published: 24 Feb 2016

Imprivata

Stopping Privilege Creep: Limiting User Privileges with Access Reviews
sponsored by SearchSecurity.com
EGUIDE: This SearchSecurity.com e-guide outlines the risks of privilege creep and outlines the remedies available to help you successfully mitigate them. View now to learn more!
Posted: 29 Jul 2013 | Published: 29 Jul 2013

SearchSecurity.com

Smarter Service Management: A CIO's Perspective
sponsored by Matrix42
WHITE PAPER: This white paper discusses the modern CIO's top IT challenges, as well as how you can transform outdated IT service management (ITSM) practices to overcome them.
Posted: 03 Mar 2016 | Published: 31 Dec 2015

Matrix42

Four Steps to Being More Mobile Than Ever
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this expert white paper to examine four key steps involved in enhancing mobility. Discover technologies and platforms that will give your organization the foundation it needs to be more flexible and mobile than ever.
Posted: 18 Mar 2015 | Published: 18 Mar 2015

Dell, Inc. and Intel®

Recovery Tools and Tips for Your Virtual Server Backup Strategy
sponsored by Veritas
EGUIDE: With all of the options admins have today, sometimes, it can be easy to forget about virtual server backups. In this expert e-guide, you will discover several, top-of-the-line recovery tools and tips to aid your virtual server backup strategy, and ensure every backup is handled correctly in your enterprise.
Posted: 17 Mar 2016 | Published: 17 Mar 2016

Veritas

BYOD Security: How to Remotely Wipe iPhone and Android Devices
sponsored by SearchSecurity.com
EGUIDE: In this expert e-guide, explore the need for remote data wipe on top of mandatory PINs and passwords to ensure optimum data protection in this BYOD age. Click now to get started!
Posted: 09 Dec 2013 | Published: 09 Dec 2013

SearchSecurity.com

The big returns from big data
sponsored by ComputerWeekly.com
ANALYST REPORT: Organisations can earn an incremental ROI of 241 percent by using big data technology to examine large and complex data sets, according to this report from Nucleus Research.
Posted: 05 Apr 2012 | Published: 05 Apr 2012

ComputerWeekly.com

When IaaS Won't Cut It: Planning a Transition to PaaS Cloud
sponsored by Dell, Inc. and Red Hat
EGUIDE: Transitioning to PaaS isn't as easy as you think. In this exclusive e-guide, cloud consultant Tom Nolle offers expert tips for an IaaS to PaaS transition. Learn how to choose IaaS and PaaS providers, steps to take when a migration doesn't work, and more.
Posted: 11 May 2016 | Published: 10 May 2016

Dell, Inc. and Red Hat
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement